Which of the following describes an instance of legal hacking?(2 points) Responses Grey hat hacking Grey hat hacking Penetration testing for a company. Penetration testing for a company. Looking for security risks on a product that is excluded from a bug bounty program. Looking for security risks on a product that is excluded from a bug bounty program. Security hacking is never legal. Security hacking is never legal. Question 2 What is NOT true of white hat hackers?(2 points) Responses They are breaking the law and are at risk of legal repercussions. They are breaking the law and are at risk of legal repercussions. They alert companies of security vulnerabilities. They alert companies of security vulnerabilities. They contribute to robust security systems. They contribute to robust security systems. They use the same methods as black hat hackers. They use the same methods as black hat hackers. Question 3 It is legal to practice hacking websites as long as you are a student learning about cybersecurity.(2 points) Responses True True False False Question 4 Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken? (2 points) Responses Confidentiality Confidentiality Integrity Integrity Availability Availability Question 5 In cybersecurity, what does CIA stand for?(2 points) Responses Confidentiality, Integrity, Availability Confidentiality, Integrity, Availability Central Intelligence Agency Central Intelligence Agency Cybersecurity, Internet, Accessibility Cybersecurity, Internet, Accessibility Cybersecurity Investigation Agency Cybersecurity Investigation Agency Question 6 Which of the following are best practices for having a secure password?(2 points) Responses Creating a password that is long in length. Creating a password that is long in length. Creating a password that has a combination of letters, numbers, and special characters. Creating a password that has a combination of letters, numbers, and special characters. Using a password manager. Using a password manager. All of the above. All of the above. Question 7 By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.(2 points) Responses True- This is always the case. True- This is always the case. False- It depends if the privacy policy allows you to opt in or out of sharing data.

False- It depends if the privacy policy allows you to opt in or out of sharing data.